Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Under the Wing: Protecting Small Businesses Against Big Attacks

70% of all cyberattacks target small to midsize businesses. Adversaries know that most small businesses don’t have the time, tools or staff to go head to head against today’s threats. In this episode, learn how fast, simple and affordable it can be to protect your business.

11:11 Systems' CTO shares insight into Oakland's ransomware attack

The city of Oakland was victim of a ransomware attack, gaining access to city services, employee information, payroll, and more. TVU Fox 2 interviewed Justin Giardina, Chief Technical Officer of 11:11 Systems, and asked him to share insight into the cybersecurity situation.

A CISOs Guide To The New 2023 OWASP API Security Update

The OWASP API Security Project team recently posted the Top-10 API risks Release Candidate (RC) for 2023. Last updated in 2019, this new version is designed to help organizations understand the top threats against APIs and how to secure them. In this webinar, we will dig into the OWASP API Security Top-10 2023RC and discuss: We will share some of our data-driven insights, derived from our quarterly API ThreatStats(tm) Reports, and show how you can protect your APIs in real-time from the most impactful API threats.

A Practitioner's Guide to the New 2023 OWASP API Security Update

The OWASP API Security Top-10 risks Release Candidate (RC) is now out for comment. This new version is designed to update your understanding of the top threats against APIs and how to secure them. In this deep-dive webinar, we will dig into each of the OWASP API Security Top-10 2023 RC risks and discuss: The focus of this 2nd webinar in the series will be on what practitioners – builders, breakers, defenders, and DevSecOps – need to know to better protect their APIs.

Demo: Introducing A10 Next-Gen WAF, Powered by Fastly

A10 Next-Gen WAF, powered by Fastly, leverages advanced technology to protect web applications from complex modern threats while minimizing false positives and ensuring availability. See how our integrated Next-Gen WAF, enabled on Thunder ADC, effectively blocks attacks while remaining user-friendly. Get insights into its visibility, DevOps, security tool integrations, and analytics features for advanced web application protection.

CI DevSecOps Series - Level Up Your Tests

Building secure and reliable APIs is an essential and challenging endeavor. Traditional API testing approaches perform blackbox testing and test the application through the network. This is both slow and lacks deep insights into how the tested application handles API requests. Also, it happens late in the software development lifecycle as it requires a complete application deployment.

Create and Run an Unauthenticated Dynamic Analysis of a Web Application

In this video, you will learn how to create, configure, and schedule an unauthenticated Dynamic Analysis. An unauthenticated Dynamic Analysis scan is appropriate when the site you are scanning does not require a login. Veracode Dynamic Analysis also supports the scanning of websites that require authentication, such as login via a web form, browser-based, or NTLM.